I booted a Wheezy 7.8 live CD and everything is working fine on my t61 laptop connecting to my home router. Attached logs of: wpa_supplicant -i wlan0 -ddd -Dnl80211 -c wpa.conf &> nl80211aa.log wpa_supplicant -i wlan0 -ddd -Dwext -c wpa.conf &> wextaa.log
wpa_supplicant v1.0 random: Trying to read entropy from /dev/random Initializing interface 'wlan0' conf 'wpa.conf' driver 'nl80211' ctrl_interface 'N/A' bridge 'N/A' Configuration file 'wpa.conf' -> '/root/wpa.conf' Reading configuration file '/root/wpa.conf' ctrl_interface='/var/run/wpa_supplicant2' Line: 5 - start of a new network block ssid - hexdump_ascii(len=2): 47 47 GG key_mgmt: 0x2 proto: 0x2 pairwise: 0x10 group: 0x10 PSK (ASCII passphrase) - hexdump_ascii(len=44): [REMOVED] PSK (from passphrase) - hexdump(len=32): [REMOVED] Priority group 0 id=0 ssid='GG' nl80211: interface wlan0 in phy phy1 rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0 nl80211: Set mode ifindex 4 iftype 2 (STATION) netlink: Operstate: linkmode=1, operstate=5 nl80211: Using driver-based off-channel TX nl80211: driver param='(null)' nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz nl80211: 2457-2482 @ 40 MHz nl80211: 2474-2494 @ 20 MHz nl80211: 5170-5250 @ 160 MHz nl80211: 5250-5330 @ 160 MHz nl80211: 5490-5730 @ 160 MHz nl80211: 5735-5835 @ 80 MHz nl80211: 57240-63720 @ 2160 MHz nl80211: Added 802.11b mode based on 802.11g information wlan0: Own MAC address: 00:18:de:2c:9b:5d wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wlan0: RSN: flushing PMKID list in the driver nl80211: Flush PMKIDs wlan0: Setting scan request: 0 sec 100000 usec WPS: Set UUID for interface wlan0 WPS: UUID based on MAC address - hexdump(len=16): 8e 3c fe e4 0f 0f 55 32 9e 84 da 35 28 dc 7e 38 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized wlan0: Added interface wlan0 random: Got 20/20 bytes from /dev/random wlan0: State: DISCONNECTED -> SCANNING wlan0: Starting AP scan for wildcard SSID nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] Scan requested (ret=0) - scan timeout 10 seconds nl80211: Event message available nl80211: Scan trigger EAPOL: disable timer tick EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added nl80211: if_removed already cleared - ignore event nl80211: Event message available nl80211: New scan results available wlan0: Event SCAN_RESULTS (3) received nl80211: Received scan results (4 BSSes) Sorted scan results 00:0f:b5:57:a7:48 freq=2457 qual=0 noise=0 level=-45 flags=0xb 06:0f:b5:57:a7:48 freq=2457 qual=0 noise=0 level=-45 flags=0xb f8:7b:8c:27:35:10 freq=2437 qual=0 noise=0 level=-85 flags=0xb 2c:b0:5d:3c:d1:84 freq=2437 qual=0 noise=0 level=-86 flags=0xb wlan0: BSS: Start scan result update 1 wlan0: BSS: Add new id 0 BSSID 00:0f:b5:57:a7:48 SSID 'GG' wlan0: BSS: Add new id 1 BSSID 06:0f:b5:57:a7:48 SSID 'NETGEAR - 1' wlan0: BSS: Add new id 2 BSSID f8:7b:8c:27:35:10 SSID 'Amped_SR' wlan0: BSS: Add new id 3 BSSID 2c:b0:5d:3c:d1:84 SSID 'MMerrr 2.4_PIN' Add randomness: count=1 entropy=0 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=2 entropy=1 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=3 entropy=2 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=4 entropy=3 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] wlan0: New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=13 WPS: attr type=0x1023 len=10 WPS: attr type=0x1024 len=10 WPS: attr type=0x1042 len=2 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=10 WPS: attr type=0x1008 len=2 WPS: attr type=0x103c len=1 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=13 WPS: attr type=0x1023 len=10 WPS: attr type=0x1024 len=10 WPS: attr type=0x1042 len=2 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=10 WPS: attr type=0x1008 len=2 WPS: attr type=0x103c len=1 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=13 WPS: attr type=0x1023 len=10 WPS: attr type=0x1024 len=10 WPS: attr type=0x1042 len=2 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=10 WPS: attr type=0x1008 len=2 WPS: attr type=0x103c len=1 wlan0: Selecting BSS from priority group 0 wlan0: 0: 00:0f:b5:57:a7:48 ssid='GG' wpa_ie_len=0 rsn_ie_len=20 caps=0x431 level=-45 wlan0: selected based on RSN IE wlan0: selected BSS 00:0f:b5:57:a7:48 ssid='GG' wlan0: Request association: reassociate: 0 selected: 00:0f:b5:57:a7:48 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING wlan0: Automatic auth_alg selection: 0x1 wlan0: RSN: using IEEE 802.11i/D9.0 wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlan0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 wlan0: WPA: using GTK CCMP wlan0: WPA: using PTK CCMP wlan0: WPA: using KEY_MGMT WPA-PSK wlan0: WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlan0: Cancelling scan request wlan0: SME: Trying to authenticate with 00:0f:b5:57:a7:48 (SSID='GG' freq=2457 MHz) wlan0: No keys have been configured - skip key clearing wlan0: State: SCANNING -> AUTHENTICATING EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized nl80211: Authenticate (ifindex=4) * bssid=00:0f:b5:57:a7:48 * freq=2457 * SSID - hexdump_ascii(len=2): 47 47 GG * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully RSN: Ignored PMKID candidate without preauth flag wlan0: Checking for other virtual interfaces sharing same radio (phy1) in event_scan_results nl80211: Event message available nl80211: MLME event 37 nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 18 de 2c 9b 5d 00 0f b5 57 a7 48 00 0f b5 57 a7 48 00 e2 00 00 02 00 00 00 wlan0: Event AUTH (11) received wlan0: SME: Authentication response: peer=00:0f:b5:57:a7:48 auth_type=0 status_code=0 SME: Authentication response IEs - hexdump(len=0): [NULL] wlan0: Trying to associate with 00:0f:b5:57:a7:48 (SSID='GG' freq=2457 MHz) wlan0: State: AUTHENTICATING -> ASSOCIATING wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 nl80211: Associate (ifindex=4) * bssid=00:0f:b5:57:a7:48 * freq=2457 * SSID - hexdump_ascii(len=2): 47 47 GG * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 * pairwise=0xfac04 * group=0xfac04 nl80211: Association request send successfully nl80211: Event message available nl80211: New station 00:0f:b5:57:a7:48 wlan0: RX EAPOL from 00:0f:b5:57:a7:48 RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 15 80 fa 34 93 65 fa 70 d5 5f a9 b4 ef 61 df d3 46 e8 fa 0e 6f 86 ba 06 88 3f e6 04 66 86 c5 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added nl80211: if_removed already cleared - ignore event RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added nl80211: if_removed already cleared - ignore event RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added nl80211: if_removed already cleared - ignore event nl80211: Event message available nl80211: MLME event 38 nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 00 18 de 2c 9b 5d 00 0f b5 57 a7 48 00 0f b5 57 a7 48 10 e2 31 04 00 00 02 c0 01 08 82 84 8b 96 8c 98 b0 48 32 04 12 24 60 6c dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlan0: Event ASSOC (0) received wlan0: Association info event resp_ies - hexdump(len=42): 01 08 82 84 8b 96 8c 98 b0 48 32 04 12 24 60 6c dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlan0: freq=2457 MHz FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlan0: State: ASSOCIATING -> ASSOCIATED wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wlan0: Associated to a new BSS: BSSID=00:0f:b5:57:a7:48 Add randomness: count=5 entropy=4 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=6): [REMOVED] random pool - hexdump(len=128): [REMOVED] wlan0: No keys have been configured - skip key clearing wlan0: Associated with 00:0f:b5:57:a7:48 wlan0: WPA: Association event - clear replay counter wlan0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: Cancelling scan request wlan0: Process pending EAPOL frame that was received just before association notification wlan0: RX EAPOL from 00:0f:b5:57:a7:48 RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 15 80 fa 34 93 65 fa 70 d5 5f a9 b4 ef 61 df d3 46 e8 fa 0e 6f 86 ba 06 88 3f e6 04 66 86 c5 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: IEEE 802.1X RX: version=1 type=3 length=95 wlan0: EAPOL-Key type=2 wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 15 80 fa 34 93 65 fa 70 d5 5f a9 b4 ef 61 df d3 46 e8 fa 0e 6f 86 ba 06 88 3f e6 04 66 86 c5 28 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 15 80 fa 34 93 65 fa 70 d5 5f a9 b4 ef 61 df d3 46 e8 fa 0e 6f 86 ba 06 88 3f e6 04 66 86 c5 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from 00:0f:b5:57:a7:48 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): Get randomness: len=32 entropy=5 random from os_get_random - hexdump(len=32): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] mixed random - hexdump(len=32): [REMOVED] WPA: Renewed SNonce - hexdump(len=32): ad a7 f9 a0 c5 2e 11 f5 bf 07 81 4d 50 13 39 f1 bc 63 aa f5 9b bf f0 a3 f0 0e ff db 17 dc 48 49 WPA: PTK derivation - A1=00:18:de:2c:9b:5d A2=00:0f:b5:57:a7:48 WPA: Nonce1 - hexdump(len=32): ad a7 f9 a0 c5 2e 11 f5 bf 07 81 4d 50 13 39 f1 bc 63 aa f5 9b bf f0 a3 f0 0e ff db 17 dc 48 49 WPA: Nonce2 - hexdump(len=32): 15 80 fa 34 93 65 fa 70 d5 5f a9 b4 ef 61 df d3 46 e8 fa 0e 6f 86 ba 06 88 3f e6 04 66 86 c5 28 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): b8 69 88 fa 6c bb 74 1e 5f 30 31 1b ae 82 15 e3 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 ad a7 f9 a0 c5 2e 11 f5 bf 07 81 4d 50 13 39 f1 bc 63 aa f5 9b bf f0 a3 f0 0e ff db 17 dc 48 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 69 88 fa 6c bb 74 1e 5f 30 31 1b ae 82 15 e3 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 nl80211: Event message available nl80211: Ignore connect event (cmd=46) when using userspace SME wlan0: RX EAPOL from 00:0f:b5:57:a7:48 RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 15 80 fa 34 93 65 fa 70 d5 5f a9 b4 ef 61 df d3 46 e8 fa 0e 6f 86 ba 06 88 3f e6 04 66 86 c5 28 4c 4a 1a 26 8d e1 a6 85 08 2d d5 bf dd ee ed 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 de 60 15 c3 fd ee 11 5e d6 ca 22 69 a5 00 a3 53 00 38 b8 63 b5 2d 85 99 71 3d 8c dd a0 9a 0c 13 76 66 40 a2 0f 33 d1 a9 2f 19 21 75 2b 74 93 9e 54 2b 0f 8b 40 de fb 72 66 d9 9a 7d 59 ff 1f ff 26 e9 24 06 a3 f0 7e ea b7 8d wlan0: IEEE 802.1X RX: version=1 type=3 length=151 wlan0: EAPOL-Key type=2 wlan0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlan0: key_length=16 key_data_length=56 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 15 80 fa 34 93 65 fa 70 d5 5f a9 b4 ef 61 df d3 46 e8 fa 0e 6f 86 ba 06 88 3f e6 04 66 86 c5 28 key_iv - hexdump(len=16): 4c 4a 1a 26 8d e1 a6 85 08 2d d5 bf dd ee ed 0b key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): de 60 15 c3 fd ee 11 5e d6 ca 22 69 a5 00 a3 53 WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 15 80 fa 34 93 65 fa 70 d5 5f a9 b4 ef 61 df d3 46 e8 fa 0e 6f 86 ba 06 88 3f e6 04 66 86 c5 28 4c 4a 1a 26 8d e1 a6 85 08 2d d5 bf dd ee ed 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 de 60 15 c3 fd ee 11 5e d6 ca 22 69 a5 00 a3 53 00 38 b8 63 b5 2d 85 99 71 3d 8c dd a0 9a 0c 13 76 66 40 a2 0f 33 d1 a9 2f 19 21 75 2b 74 93 9e 54 2b 0f 8b 40 de fb 72 66 d9 9a 7d 59 ff 1f ff 26 e9 24 06 a3 f0 7e ea b7 8d RSN: encrypted key data - hexdump(len=56): b8 63 b5 2d 85 99 71 3d 8c dd a0 9a 0c 13 76 66 40 a2 0f 33 d1 a9 2f 19 21 75 2b 74 93 9e 54 2b 0f 8b 40 de fb 72 66 d9 9a 7d 59 ff 1f ff 26 e9 24 06 a3 f0 7e ea b7 8d WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlan0: WPA: RX message 3 of 4-Way Handshake from 00:0f:b5:57:a7:48 (ver=2) WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 1d 9d 3b 7f a7 38 4c 38 2b 2e 2e 54 0e df a2 bf 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=2): 00 00 wlan0: WPA: Sending EAPOL-Key 4/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 7a 02 1e 7f 0d a9 76 7e c1 18 c1 c2 6e ab a9 30 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7a 02 1e 7f 0d a9 76 7e c1 18 c1 c2 6e ab a9 30 00 00 wlan0: WPA: Installing PTK to the driver wpa_driver_nl80211_set_key: ifindex=4 alg=3 addr=0x741518 key_idx=0 set_tx=1 seq_len=6 key_len=16 addr=00:0f:b5:57:a7:48 EAPOL: External notification - portValid=1 wlan0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlan0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16) WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_nl80211_set_key: ifindex=4 alg=3 addr=0x4a2c7c key_idx=1 set_tx=0 seq_len=6 key_len=16 broadcast key wlan0: WPA: Key negotiation completed with 00:0f:b5:57:a7:48 [PTK=CCMP GTK=CCMP] wlan0: Cancelling authentication timeout wlan0: State: GROUP_HANDSHAKE -> COMPLETED wlan0: CTRL-EVENT-CONNECTED - Connection to 00:0f:b5:57:a7:48 completed (auth) [id=0 id_str=] wpa_driver_nl80211_set_operstate: operstate 0->1 (UP) netlink: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added nl80211: if_removed already cleared - ignore event nl80211: Event message available nl80211: Regulatory domain change wlan0: Event CHANNEL_LIST_CHANGED (31) received nl80211: Regulatory information - country=US nl80211: 2402-2472 @ 40 MHz nl80211: 5170-5250 @ 80 MHz nl80211: 5250-5330 @ 80 MHz nl80211: 5735-5835 @ 80 MHz nl80211: 57240-63720 @ 2160 MHz nl80211: Added 802.11b mode based on 802.11g information EAPOL: startWhen --> 0 EAPOL: disable timer tick wlan0: CTRL-EVENT-TERMINATING - signal 2 received wlan0: Removing interface wlan0 wpa_driver_nl80211_deauthenticate(addr=00:0f:b5:57:a7:48 reason_code=3) wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0x73df90 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=00:0f:b5:57:a7:48 wlan0: State: COMPLETED -> DISCONNECTED wpa_driver_nl80211_set_operstate: operstate 1->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state INITIALIZE EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized wlan0: No keys have been configured - skip key clearing wlan0: BSS: Remove id 0 BSSID 00:0f:b5:57:a7:48 SSID 'GG' wlan0: BSS: Remove id 1 BSSID 06:0f:b5:57:a7:48 SSID 'NETGEAR - 1' wlan0: BSS: Remove id 2 BSSID f8:7b:8c:27:35:10 SSID 'Amped_SR' wlan0: BSS: Remove id 3 BSSID 2c:b0:5d:3c:d1:84 SSID 'MMerrr 2.4_PIN' wlan0: Cancelling scan request wlan0: Cancelling authentication timeout netlink: Operstate: linkmode=0, operstate=6 nl80211: Set mode ifindex 4 iftype 2 (STATION)
ioctl[SIOCSIWENCODEEXT]: Invalid argument ioctl[SIOCSIWENCODEEXT]: Invalid argument wpa_supplicant v1.0 random: Trying to read entropy from /dev/random Initializing interface 'wlan0' conf 'wpa.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file 'wpa.conf' -> '/root/wpa.conf' Reading configuration file '/root/wpa.conf' ctrl_interface='/var/run/wpa_supplicant2' Line: 5 - start of a new network block ssid - hexdump_ascii(len=2): 47 47 GG key_mgmt: 0x2 proto: 0x2 pairwise: 0x10 group: 0x10 PSK (ASCII passphrase) - hexdump_ascii(len=44): [REMOVED] PSK (from passphrase) - hexdump(len=32): [REMOVED] Priority group 0 id=0 ssid='GG' WEXT: cfg80211-based driver detected wext: interface wlan0 phy: phy1 rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0 SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf capabilities: key_mgmt 0xf enc 0xf flags 0x0 netlink: Operstate: linkmode=1, operstate=5 wlan0: Own MAC address: 00:18:de:2c:9b:5d wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0 Driver did not support SIOCSIWENCODEEXT wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0 Driver did not support SIOCSIWENCODEEXT wpa_driver_wext_set_countermeasures wlan0: RSN: flushing PMKID list in the driver wlan0: Setting scan request: 0 sec 100000 usec WPS: Set UUID for interface wlan0 WPS: UUID based on MAC address - hexdump(len=16): 8e 3c fe e4 0f 0f 55 32 9e 84 da 35 28 dc 7e 38 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized wlan0: Added interface wlan0 random: Got 17/20 bytes from /dev/random RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=16 wlan0: State: DISCONNECTED -> SCANNING wlan0: Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 10 seconds EAPOL: disable timer tick EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b19 len=16 wlan0: Event SCAN_RESULTS (3) received Received 2555 bytes of scan results (5 BSSes) Sorted scan results 00:0f:b5:57:a7:48 freq=2457 qual=65 noise=0 level=-45 flags=0xa 06:0f:b5:57:a7:48 freq=2457 qual=65 noise=0 level=-45 flags=0xa f8:7b:8c:27:35:10 freq=2437 qual=25 noise=0 level=-85 flags=0xa 94:cc:b9:e9:cb:b0 freq=2412 qual=24 noise=0 level=-86 flags=0xa 2c:b0:5d:3c:d1:84 freq=2437 qual=23 noise=0 level=-87 flags=0xa wlan0: BSS: Start scan result update 1 wlan0: BSS: Add new id 0 BSSID 00:0f:b5:57:a7:48 SSID 'GG' wlan0: BSS: Add new id 1 BSSID 06:0f:b5:57:a7:48 SSID 'NETGEAR - 1' wlan0: BSS: Add new id 2 BSSID f8:7b:8c:27:35:10 SSID 'Amped_SR' wlan0: BSS: Add new id 3 BSSID 94:cc:b9:e9:cb:b0 SSID 'ATT224' wlan0: BSS: Add new id 4 BSSID 2c:b0:5d:3c:d1:84 SSID 'MMerrr 2.4_PIN' Add randomness: count=1 entropy=0 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=2 entropy=1 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=3 entropy=2 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=4 entropy=3 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=5 entropy=4 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] wlan0: New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=13 WPS: attr type=0x1023 len=10 WPS: attr type=0x1024 len=10 WPS: attr type=0x1042 len=2 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=10 WPS: attr type=0x1008 len=2 WPS: attr type=0x103c len=1 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=13 WPS: attr type=0x1023 len=10 WPS: attr type=0x1024 len=10 WPS: attr type=0x1042 len=2 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=10 WPS: attr type=0x1008 len=2 WPS: attr type=0x103c len=1 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=13 WPS: attr type=0x1023 len=10 WPS: attr type=0x1024 len=10 WPS: attr type=0x1042 len=2 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=10 WPS: attr type=0x1008 len=2 WPS: attr type=0x103c len=1 wlan0: Selecting BSS from priority group 0 wlan0: 0: 00:0f:b5:57:a7:48 ssid='GG' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-45 wlan0: selected based on RSN IE wlan0: selected BSS 00:0f:b5:57:a7:48 ssid='GG' wlan0: Request association: reassociate: 0 selected: 00:0f:b5:57:a7:48 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING wlan0: Trying to associate with 00:0f:b5:57:a7:48 (SSID='GG' freq=2457 MHz) FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlan0: Cancelling scan request wlan0: WPA: clearing own WPA/RSN IE wlan0: Automatic auth_alg selection: 0x1 wlan0: RSN: using IEEE 802.11i/D9.0 wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlan0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 wlan0: WPA: using GTK CCMP wlan0: WPA: using PTK CCMP wlan0: WPA: using KEY_MGMT WPA-PSK wlan0: WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 wlan0: No keys have been configured - skip key clearing wlan0: State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk wlan0: Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RSN: Ignored PMKID candidate without preauth flag wlan0: Checking for other virtual interfaces sharing same radio (phy1) in event_scan_results RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b04 len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=18 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8c08 len=58 AssocResp IE wireless event - hexdump(len=42): 01 08 82 84 8b 96 8c 98 b0 48 32 04 12 24 60 6c dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:0f:b5:57:a7:48 wlan0: Event ASSOCINFO (4) received wlan0: Association info event resp_ies - hexdump(len=42): 01 08 82 84 8b 96 8c 98 b0 48 32 04 12 24 60 6c dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlan0: Event ASSOC (0) received wlan0: State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wlan0: Associated to a new BSS: BSSID=00:0f:b5:57:a7:48 Add randomness: count=6 entropy=5 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=6): [REMOVED] random pool - hexdump(len=128): [REMOVED] wlan0: No keys have been configured - skip key clearing wlan0: Associated with 00:0f:b5:57:a7:48 wlan0: WPA: Association event - clear replay counter wlan0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: Cancelling scan request wlan0: RX EAPOL from 00:0f:b5:57:a7:48 RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 e3 92 31 79 47 61 5c 92 9a fe 7d 04 20 8e 51 39 1d ef 49 82 c3 a4 df 5a 72 3d 92 83 32 6f e1 e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: IEEE 802.1X RX: version=1 type=3 length=95 wlan0: EAPOL-Key type=2 wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): e3 92 31 79 47 61 5c 92 9a fe 7d 04 20 8e 51 39 1d ef 49 82 c3 a4 df 5a 72 3d 92 83 32 6f e1 e1 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 e3 92 31 79 47 61 5c 92 9a fe 7d 04 20 8e 51 39 1d ef 49 82 c3 a4 df 5a 72 3d 92 83 32 6f e1 e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from 00:0f:b5:57:a7:48 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): Get randomness: len=32 entropy=6 random from os_get_random - hexdump(len=32): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] mixed random - hexdump(len=32): [REMOVED] WPA: Renewed SNonce - hexdump(len=32): 48 05 ed ea a0 19 f9 fc 76 62 ad 88 b4 c8 5d f6 43 50 dd b0 34 ec 2a cb 85 34 f2 10 16 19 5a 07 WPA: PTK derivation - A1=00:18:de:2c:9b:5d A2=00:0f:b5:57:a7:48 WPA: Nonce1 - hexdump(len=32): 48 05 ed ea a0 19 f9 fc 76 62 ad 88 b4 c8 5d f6 43 50 dd b0 34 ec 2a cb 85 34 f2 10 16 19 5a 07 WPA: Nonce2 - hexdump(len=32): e3 92 31 79 47 61 5c 92 9a fe 7d 04 20 8e 51 39 1d ef 49 82 c3 a4 df 5a 72 3d 92 83 32 6f e1 e1 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 7e 80 e0 c0 5e b2 b7 aa 57 45 d6 c3 cb 70 e0 e3 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 48 05 ed ea a0 19 f9 fc 76 62 ad 88 b4 c8 5d f6 43 50 dd b0 34 ec 2a cb 85 34 f2 10 16 19 5a 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7e 80 e0 c0 5e b2 b7 aa 57 45 d6 c3 cb 70 e0 e3 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 wlan0: RX EAPOL from 00:0f:b5:57:a7:48 RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 e3 92 31 79 47 61 5c 92 9a fe 7d 04 20 8e 51 39 1d ef 49 82 c3 a4 df 5a 72 3d 92 83 32 6f e1 e1 4c 4a 1a 24 8d e1 a6 85 08 2d d5 bf dd ee ed 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 62 69 26 b2 4e 74 91 90 19 c2 fb 73 90 c4 db 3c 00 38 78 c1 68 25 0a f0 a1 23 ea e8 52 d7 2a 2b c5 37 f7 48 ea 98 b7 d2 10 1b ac 32 ab af 3b 98 2c 27 2b aa af 4e f4 eb 85 7a 9f 3a 81 5d 02 72 77 a1 fb b6 e1 0c 35 ec 1e 3e wlan0: IEEE 802.1X RX: version=1 type=3 length=151 wlan0: EAPOL-Key type=2 wlan0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlan0: key_length=16 key_data_length=56 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): e3 92 31 79 47 61 5c 92 9a fe 7d 04 20 8e 51 39 1d ef 49 82 c3 a4 df 5a 72 3d 92 83 32 6f e1 e1 key_iv - hexdump(len=16): 4c 4a 1a 24 8d e1 a6 85 08 2d d5 bf dd ee ed 0b key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 62 69 26 b2 4e 74 91 90 19 c2 fb 73 90 c4 db 3c WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 e3 92 31 79 47 61 5c 92 9a fe 7d 04 20 8e 51 39 1d ef 49 82 c3 a4 df 5a 72 3d 92 83 32 6f e1 e1 4c 4a 1a 24 8d e1 a6 85 08 2d d5 bf dd ee ed 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 62 69 26 b2 4e 74 91 90 19 c2 fb 73 90 c4 db 3c 00 38 78 c1 68 25 0a f0 a1 23 ea e8 52 d7 2a 2b c5 37 f7 48 ea 98 b7 d2 10 1b ac 32 ab af 3b 98 2c 27 2b aa af 4e f4 eb 85 7a 9f 3a 81 5d 02 72 77 a1 fb b6 e1 0c 35 ec 1e 3e RSN: encrypted key data - hexdump(len=56): 78 c1 68 25 0a f0 a1 23 ea e8 52 d7 2a 2b c5 37 f7 48 ea 98 b7 d2 10 1b ac 32 ab af 3b 98 2c 27 2b aa af 4e f4 eb 85 7a 9f 3a 81 5d 02 72 77 a1 fb b6 e1 0c 35 ec 1e 3e WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlan0: WPA: RX message 3 of 4-Way Handshake from 00:0f:b5:57:a7:48 (ver=2) WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 1d 9d 3b 7f a7 38 4c 38 2b 2e 2e 54 0e df a2 bf 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=2): 00 00 wlan0: WPA: Sending EAPOL-Key 4/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 77 02 da 69 5e 9c bd 17 e2 f0 c5 06 bf ioctl[SIOCSIWENCODEEXT]: Invalid argument ioctl[SIOCSIWENCODEEXT]: Invalid argument 69 d2 38 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 77 02 da 69 5e 9c bd 17 e2 f0 c5 06 bf 69 d2 38 00 00 wlan0: WPA: Installing PTK to the driver wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 wlan0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlan0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16) WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16 wlan0: WPA: Key negotiation completed with 00:0f:b5:57:a7:48 [PTK=CCMP GTK=CCMP] wlan0: Cancelling authentication timeout wlan0: State: GROUP_HANDSHAKE -> COMPLETED wlan0: CTRL-EVENT-CONNECTED - Connection to 00:0f:b5:57:a7:48 completed (auth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) netlink: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event random: Got 3/3 bytes from /dev/random EAPOL: startWhen --> 0 EAPOL: disable timer tick wlan0: CTRL-EVENT-TERMINATING - signal 2 received wlan0: Removing interface wlan0 wpa_driver_wext_deauthenticate wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0 Driver did not support SIOCSIWENCODEEXT wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0 Driver did not support SIOCSIWENCODEEXT wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wlan0: State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state INITIALIZE EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized wpa_driver_wext_set_countermeasures wlan0: No keys have been configured - skip key clearing wlan0: BSS: Remove id 0 BSSID 00:0f:b5:57:a7:48 SSID 'GG' wlan0: BSS: Remove id 1 BSSID 06:0f:b5:57:a7:48 SSID 'NETGEAR - 1' wlan0: BSS: Remove id 2 BSSID f8:7b:8c:27:35:10 SSID 'Amped_SR' wlan0: BSS: Remove id 3 BSSID 94:cc:b9:e9:cb:b0 SSID 'ATT224' wlan0: BSS: Remove id 4 BSSID 2c:b0:5d:3c:d1:84 SSID 'MMerrr 2.4_PIN' wlan0: Cancelling scan request wlan0: Cancelling authentication timeout netlink: Operstate: linkmode=0, operstate=6